Design and implementation of security in healthcare cloud computing

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

As technology keeps on evolving, different organisations makeuse of the recent trends in technology and the health sector is no exception.As the cost of healthcare services is increasing, healthcare professionals arebecoming scarce. Healthcare organisations have also adopted the latesttechnology of cloud computing. The introduction of cloud computing hasproved to be a feasible idea on the information technology community.Rather than keeping the patient's information in a file in a health facilityhe/she was treated in, the information is stored in a cloud so that it can beshared amongst all health organisations and health professionals.Information is stored in a central place where it can be easily accessed, thussaving time and avoiding repetition of always writing the informationeach time a patient is attended to in a different facility. However, thereare issues with sharing such information on the cloud since it is sensitiveinformation. Ensuring this sensitive information security, availability andscalability are a major factor in the cloud computing environment. In thisstudy, we proposed a mathematical model for measuring the availabilityof data and machines (nodes). We also present the current state-of-the-artresearch in this field by focusing on several shortcomings of currenthealthcare solutions and standards and we further proposed a system thatwill encrypt data before it is being sent to the cloud. The system isintended to be linked to the cloud in such a way that, before the clientsubmits the data to the cloud and, the data will go through that system forencryption. The paper presents the steps to achieve the proposed systemand also a sample encrypted and decrypted file. © 2017 Molamoganyi Gorata, Adamu Murtala Zungeru, Mmoloki Mangwala and Joseph Chuma.
Original languageEnglish
Pages (from-to)34-47
Number of pages14
JournalJournal of Computer Science
Volume13
Issue number2
DOIs
Publication statusPublished - 2017

Fingerprint

Cloud computing
Health
Security of data
Information technology
Availability
Mathematical models
Costs

Cite this

@article{2698755cfdc54be4938f0ab74d8b6c84,
title = "Design and implementation of security in healthcare cloud computing",
abstract = "As technology keeps on evolving, different organisations makeuse of the recent trends in technology and the health sector is no exception.As the cost of healthcare services is increasing, healthcare professionals arebecoming scarce. Healthcare organisations have also adopted the latesttechnology of cloud computing. The introduction of cloud computing hasproved to be a feasible idea on the information technology community.Rather than keeping the patient's information in a file in a health facilityhe/she was treated in, the information is stored in a cloud so that it can beshared amongst all health organisations and health professionals.Information is stored in a central place where it can be easily accessed, thussaving time and avoiding repetition of always writing the informationeach time a patient is attended to in a different facility. However, thereare issues with sharing such information on the cloud since it is sensitiveinformation. Ensuring this sensitive information security, availability andscalability are a major factor in the cloud computing environment. In thisstudy, we proposed a mathematical model for measuring the availabilityof data and machines (nodes). We also present the current state-of-the-artresearch in this field by focusing on several shortcomings of currenthealthcare solutions and standards and we further proposed a system thatwill encrypt data before it is being sent to the cloud. The system isintended to be linked to the cloud in such a way that, before the clientsubmits the data to the cloud and, the data will go through that system forencryption. The paper presents the steps to achieve the proposed systemand also a sample encrypted and decrypted file. {\circledC} 2017 Molamoganyi Gorata, Adamu Murtala Zungeru, Mmoloki Mangwala and Joseph Chuma.",
author = "M. Gorata and A.M. Zungeru and M. Mangwala and J. Chuma",
note = "Cited By :1 Export Date: 15 June 2018",
year = "2017",
doi = "10.3844/jcssp.2017.34.47",
language = "English",
volume = "13",
pages = "34--47",
journal = "Journal of Computer Science",
issn = "1549-3636",
publisher = "Science Publications",
number = "2",

}

Design and implementation of security in healthcare cloud computing. / Gorata, M.; Zungeru, A.M.; Mangwala, M.; Chuma, J.

In: Journal of Computer Science, Vol. 13, No. 2, 2017, p. 34-47.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Design and implementation of security in healthcare cloud computing

AU - Gorata, M.

AU - Zungeru, A.M.

AU - Mangwala, M.

AU - Chuma, J.

N1 - Cited By :1 Export Date: 15 June 2018

PY - 2017

Y1 - 2017

N2 - As technology keeps on evolving, different organisations makeuse of the recent trends in technology and the health sector is no exception.As the cost of healthcare services is increasing, healthcare professionals arebecoming scarce. Healthcare organisations have also adopted the latesttechnology of cloud computing. The introduction of cloud computing hasproved to be a feasible idea on the information technology community.Rather than keeping the patient's information in a file in a health facilityhe/she was treated in, the information is stored in a cloud so that it can beshared amongst all health organisations and health professionals.Information is stored in a central place where it can be easily accessed, thussaving time and avoiding repetition of always writing the informationeach time a patient is attended to in a different facility. However, thereare issues with sharing such information on the cloud since it is sensitiveinformation. Ensuring this sensitive information security, availability andscalability are a major factor in the cloud computing environment. In thisstudy, we proposed a mathematical model for measuring the availabilityof data and machines (nodes). We also present the current state-of-the-artresearch in this field by focusing on several shortcomings of currenthealthcare solutions and standards and we further proposed a system thatwill encrypt data before it is being sent to the cloud. The system isintended to be linked to the cloud in such a way that, before the clientsubmits the data to the cloud and, the data will go through that system forencryption. The paper presents the steps to achieve the proposed systemand also a sample encrypted and decrypted file. © 2017 Molamoganyi Gorata, Adamu Murtala Zungeru, Mmoloki Mangwala and Joseph Chuma.

AB - As technology keeps on evolving, different organisations makeuse of the recent trends in technology and the health sector is no exception.As the cost of healthcare services is increasing, healthcare professionals arebecoming scarce. Healthcare organisations have also adopted the latesttechnology of cloud computing. The introduction of cloud computing hasproved to be a feasible idea on the information technology community.Rather than keeping the patient's information in a file in a health facilityhe/she was treated in, the information is stored in a cloud so that it can beshared amongst all health organisations and health professionals.Information is stored in a central place where it can be easily accessed, thussaving time and avoiding repetition of always writing the informationeach time a patient is attended to in a different facility. However, thereare issues with sharing such information on the cloud since it is sensitiveinformation. Ensuring this sensitive information security, availability andscalability are a major factor in the cloud computing environment. In thisstudy, we proposed a mathematical model for measuring the availabilityof data and machines (nodes). We also present the current state-of-the-artresearch in this field by focusing on several shortcomings of currenthealthcare solutions and standards and we further proposed a system thatwill encrypt data before it is being sent to the cloud. The system isintended to be linked to the cloud in such a way that, before the clientsubmits the data to the cloud and, the data will go through that system forencryption. The paper presents the steps to achieve the proposed systemand also a sample encrypted and decrypted file. © 2017 Molamoganyi Gorata, Adamu Murtala Zungeru, Mmoloki Mangwala and Joseph Chuma.

U2 - 10.3844/jcssp.2017.34.47

DO - 10.3844/jcssp.2017.34.47

M3 - Article

VL - 13

SP - 34

EP - 47

JO - Journal of Computer Science

JF - Journal of Computer Science

SN - 1549-3636

IS - 2

ER -